Rachel Harris, Mohannad Alkhraijah, David Huggins, D. Molzahn
{"title":"不同一致性约束公式对分布式最优潮流的影响","authors":"Rachel Harris, Mohannad Alkhraijah, David Huggins, D. Molzahn","doi":"10.1109/TPEC54980.2022.9750783","DOIUrl":null,"url":null,"abstract":"The optimal power flow (OPF) problem finds the least costly operating point which meets the power grid's operational limits and obeys physical power flow laws. Complementing today's centralized optimization paradigm, future power grids may rely on distributed optimization where multiple agents work together to determine an acceptable operating point. In distributed algorithms, local agents solve subproblems to optimize their region of the system and share data to achieve consistency with their neighboring agents' subproblems. This paper investigates how different methods of enforcing power flow consistency constraints between local areas in distributed optimal power flow impact convergence rate and a classifier's ability to detect malicious cyberattack. The distributed OPF problem is solved with the alternating direction method of multipliers (ADMM) algorithm. First, the ADMM algorithm's convergence rate is compared for three different consistency constraint formulations. Next, the paper considers a cyberattack in which the integrity of information shared between agents is compromised, causing the algorithm to exhibit unacceptable behavior. A support vector machine (SVM) classifier is trained to detect the presence of manipulated data from such cyberattacks. Results demonstrate that consistency constraint formulation impacts the classifier's detection performance; for certain formulations, detection is highly accurate.","PeriodicalId":185211,"journal":{"name":"2022 IEEE Texas Power and Energy Conference (TPEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"On the Impacts of Different Consistency Constraint Formulations for Distributed Optimal Power Flow\",\"authors\":\"Rachel Harris, Mohannad Alkhraijah, David Huggins, D. Molzahn\",\"doi\":\"10.1109/TPEC54980.2022.9750783\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The optimal power flow (OPF) problem finds the least costly operating point which meets the power grid's operational limits and obeys physical power flow laws. Complementing today's centralized optimization paradigm, future power grids may rely on distributed optimization where multiple agents work together to determine an acceptable operating point. In distributed algorithms, local agents solve subproblems to optimize their region of the system and share data to achieve consistency with their neighboring agents' subproblems. This paper investigates how different methods of enforcing power flow consistency constraints between local areas in distributed optimal power flow impact convergence rate and a classifier's ability to detect malicious cyberattack. The distributed OPF problem is solved with the alternating direction method of multipliers (ADMM) algorithm. First, the ADMM algorithm's convergence rate is compared for three different consistency constraint formulations. Next, the paper considers a cyberattack in which the integrity of information shared between agents is compromised, causing the algorithm to exhibit unacceptable behavior. A support vector machine (SVM) classifier is trained to detect the presence of manipulated data from such cyberattacks. Results demonstrate that consistency constraint formulation impacts the classifier's detection performance; for certain formulations, detection is highly accurate.\",\"PeriodicalId\":185211,\"journal\":{\"name\":\"2022 IEEE Texas Power and Energy Conference (TPEC)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Texas Power and Energy Conference (TPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TPEC54980.2022.9750783\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Texas Power and Energy Conference (TPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TPEC54980.2022.9750783","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the Impacts of Different Consistency Constraint Formulations for Distributed Optimal Power Flow
The optimal power flow (OPF) problem finds the least costly operating point which meets the power grid's operational limits and obeys physical power flow laws. Complementing today's centralized optimization paradigm, future power grids may rely on distributed optimization where multiple agents work together to determine an acceptable operating point. In distributed algorithms, local agents solve subproblems to optimize their region of the system and share data to achieve consistency with their neighboring agents' subproblems. This paper investigates how different methods of enforcing power flow consistency constraints between local areas in distributed optimal power flow impact convergence rate and a classifier's ability to detect malicious cyberattack. The distributed OPF problem is solved with the alternating direction method of multipliers (ADMM) algorithm. First, the ADMM algorithm's convergence rate is compared for three different consistency constraint formulations. Next, the paper considers a cyberattack in which the integrity of information shared between agents is compromised, causing the algorithm to exhibit unacceptable behavior. A support vector machine (SVM) classifier is trained to detect the presence of manipulated data from such cyberattacks. Results demonstrate that consistency constraint formulation impacts the classifier's detection performance; for certain formulations, detection is highly accurate.